We, at Adlice Software, have started from scratch 5 years ago. Today, I’m proud to show you the way we work with our brand new Labs, Adlice Labs.
Discover exploitation methods, exploits development and inner workings and learn about the countermeasures that exists to protect your infrastructure.
Google Chrome protects its user preferences using a hashing mechanism. However, there’s a way to bypass this, and it’s quite used by malware in the wild.